Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Union College (36)
- University of Richmond (35)
- Colby College (33)
- University of Mississippi (31)
- Louisiana State University (22)
-
- Western Michigan University (22)
- Ouachita Baptist University (16)
- The University of Southern Mississippi (11)
- University of Tennessee at Chattanooga (11)
- Bucknell University (9)
- Coastal Carolina University (4)
- University of South Alabama (4)
- Andrews University (1)
- Assumption University (1)
- Texas A&M University-Commerce (1)
- University of New Haven (1)
- Keyword
-
- Machine learning (8)
- Artificial intelligence (5)
- Computer simulation (4)
- Robotics (4)
- Algorithms (3)
-
- Computer (3)
- Computer networks (3)
- Design (3)
- Development (3)
- Human-computer interaction (3)
- Java (3)
- Machine Learning (3)
- Network (3)
- Programming (3)
- Python (3)
- Simulation (3)
- Accuracy (2)
- Algorithm (2)
- Android (2)
- Artificial Neural Networks (2)
- Computer Science (2)
- Computer Vision (2)
- Computer programming (2)
- Computer security (2)
- Data (2)
- Data collection (2)
- Deep learning (2)
- Difference sets (2)
- Electronic data processing (2)
- Emotion recognition (2)
Articles 1 - 30 of 238
Full-Text Articles in Physical Sciences and Mathematics
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed
Guardians Of The Data: Government Use Of Ai And Iot In The Digital Age, Jannat Saeed
Honors Theses
The exponential growth of technology, epitomized by Moore's Law – “the observation that the number of transistors on an integrated circuit will double every two years”– has propelled the swift evolution of Artificial Intelligence (AI) and Internet of Things (IoT) technologies. This phenomenon has revolutionized various facets of daily life, from smart home devices to autonomous vehicles, reshaping how individuals interact with the world around them. However, as governments worldwide increasingly harness these innovations to monitor and collect personal data, profound privacy concerns have arisen among the general populace. Despite the ubiquity of AI and IoT in modern society, formal …
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum
Honors Theses
Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …
Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods
Identifying Key Activity Indicators In Rats' Neuronal Data Using Lasso Regularized Logistic Regression, Avery Woods
Honors Theses
This thesis aims to identify timestamps of rats’ neuronal activity that best determine behavior using a machine learning model. Neuronal data is a complex and high-dimensional dataset, and identifying the most informative features is crucial for understanding the underlying neuronal processes. The Lasso regularization technique is employed to select the most relevant features of the data to the model’s prediction. The results of this study provide insights into the key activity indicators that are associated with specific behaviors or cognitive processes in rats, as well as the effect that stress can have on neuronal activity and behavior. Ultimately, it was …
Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction, Bozidar-Brannan Kovachev
Exploration Of Feature Selection Techniques In Machine Learning Models On Hptlc Images For Rule Extraction, Bozidar-Brannan Kovachev
Honors Theses
Research related to Biology often utilizes machine learning models that are ultimately uninterpretable by the researcher. It would be helpful if researchers could leverage the same computing power but instead gain specific insight into decision-making to gain a deeper understanding of their domain knowledge. This paper seeks to select features and derive rules from a machine learning classification problem in biochemistry. The specific point of interest is five species of Glycyrrhiza, or Licorice, and the ability to classify them using High-Performance Thin Layer Chromatography (HPTLC) images. These images were taken using HPTLC methods under varying conditions to provide eight …
Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson
Digital Dna: The Ethical Implications Of Big Data As The World’S New-Age Commodity, Clark H. Dotson
Honors Theses
In the emerging digital world that we find ourselves in, it becomes apparent that data collection has become a staple of daily life, whether we like it or not. This research discussion aims to bring light to just how much one’s own digital identity is valued in the technologically-infused world of today, with distinct research and local examples to bring awareness to the ethical implications of your online presence. The paper in question examines anecdotal and research evidence of the collection of data, both through true and unjust means, as well as ethical implications of what this information truly represents. …
Computer Organization And Assembly Language Embedded Firmware Overhaul, Elaine Yun Ru Chan
Computer Organization And Assembly Language Embedded Firmware Overhaul, Elaine Yun Ru Chan
Honors Theses
The WMU Computer Organization and Assembly Language class has encountered some difficulties in the past several years regarding the procurement of required hardware and software for the curriculum. This has led to a number of challenges for students, including:
- Difficulty in obtaining the necessary hardware and software
- Inability to complete assignments and projects due to hardware or software failures
- Frustration and anxiety caused by the challenges of the course
To address these challenges, a new choice of embedded firmware was researched and developed. This firmware allows for more reliable flashing of the MSP430 Microcontroller and remains reliable on modern operating …
Tracking System Effectiveness For Texas Police Departments In Low-Income Communities, Jakob Scarcelli
Tracking System Effectiveness For Texas Police Departments In Low-Income Communities, Jakob Scarcelli
Honors Theses
No abstract provided.
On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers
On The Pursuit Of Developer Happiness: Webcam-Based Eye Tracking And Affect Recognition In The Ide, Tamsin Rogers
Honors Theses
Recent research highlights the viability of webcam-based eye tracking as a low-cost alternative to dedicated remote eye trackers. Simultaneously, research shows the importance of understanding emotions of software developers, where it was found that emotions have significant effects on productivity, code quality, and team dynamics. In this paper, we present our work towards an integrated eye-tracking and affect recognition tool for use during software development. This combined approach could enhance our understanding of software development by combining information about the code developers are looking at, along with the emotions they experience. The presented tool utilizes an unmodified webcam to capture …
The Implementation Of Augmented Reality And Low Latency Protocols In Musical Instrumental Collaborations, Qixiao Zhu
The Implementation Of Augmented Reality And Low Latency Protocols In Musical Instrumental Collaborations, Qixiao Zhu
Honors Theses
Past projects involving musical software have been completely virtual, while these software do well in entertainment and education, there is the question of whether these software are playable to the same extent as physical musical instruments. The software presented in this paper, "AR Jam", utilizes various software and hardware tools to form a networked mixed reality system for the users to play music on. The intention of this project is to seek new ways to explore more playable musical instruments in the digital world. The paper presents the software's implementation, challenges such as optimization problems of the synthesizer, and the …
Critically Observing The Challenges And Changes: An Analysis On Covid-19’S Impact With An Emphasis On Students In Higher Education, Landon Perkins
Critically Observing The Challenges And Changes: An Analysis On Covid-19’S Impact With An Emphasis On Students In Higher Education, Landon Perkins
Honors Theses
This project involves comparing different visualizations related to COVID-19 and higher education in order to determine key impacts of the COVID-19 pandemic on students in higher education, as well as higher education as a whole. The main metrics used to determine the impact were mental health indicators for anxiety or depressive disorders, enrollment numbers by control type (public, private non-profit, or private for-profit) and state for 2020 and 2021, and state mandate lift dates for a variety of mandates implemented across the United States. These metrics were analyzed both individually and against each other to determine if they had any …
Improving Adjacency List Storage Methods For Polypeptide Similarity Analysis, Arianna Swensen
Improving Adjacency List Storage Methods For Polypeptide Similarity Analysis, Arianna Swensen
Honors Theses
Protein design is a complex biomolecular and computational problem. Working on increasingly large protein folding problems requires an improvement in current analysis methods available. This work first discusses various methods of protein design, including de novo protein design, which is the primary focus of this thesis. Then, a new approach utilizing a B+ tree to effectively store and query a graph of keys and vertices is proposed in order to store the number of times two polypeptides are considered to be similar. This approach is found to have a reduction in time complexity from current mapping methods and thus provides …
Impact Of Movements On Facial Expression Recognition, Zhebin Yin
Impact Of Movements On Facial Expression Recognition, Zhebin Yin
Honors Theses
The ability to recognize human emotions can be a useful skill for robots. Emotion recognition can help robots understand our responses to robot movements and actions. Human emotions can be recognized through facial expressions. Facial Expression Recognition (FER) is a well-established research area, how- ever, the majority of prior research is based on static datasets of images. With robots often the subject is moving, the robot is moving, or both. The purpose of this research is to determine the impact of movement on facial expression recognition. We apply a pre-existing model for FER, which performs around 70.86% on a given …
Tracking Xenophobic Terminology On Twitter Using Nlp, Harper Lyon
Tracking Xenophobic Terminology On Twitter Using Nlp, Harper Lyon
Honors Theses
Social media is a major driver of political thought, with platforms like Facebook, Twitter, and TikTok having a massive impact on how people think and vote. For this reason we should take seriously any large shifts in the language used to describe issues or groups on social media, as these are likely to either denote a change in political thought or even forecast the same. Of particular interest, given the international reach of social media, is the way that discussions around foreign relations and immigration play out. In the United States of America online spaces have become the default space …
Corrective Feedback Timing In Kanji Writing Instruction Apps, Phoenix Mulgrew
Corrective Feedback Timing In Kanji Writing Instruction Apps, Phoenix Mulgrew
Honors Theses
The focus of this research paper is to determine the correct time to provide corrective feedback to people who are learning how to write Japanese kanji. To do this, we developed a system that is able to recognize Japanese kanji that is handwritten onto an iPad screen and check for errors such as wrong stroke order. Previous research has achieved success in developing similar systems, but this project is unique because the research question involves the timing of corrective feedback. In particular, we are looking at whether immediate or delayed corrective feedback results in better learning.
Investigation Of Python Variable Privacy, Joshua Bartholomew
Investigation Of Python Variable Privacy, Joshua Bartholomew
Honors Theses
This study looks at the relative security of Python regarding private variables and functions used in most other programming languages. Python has only grown in popularity due to its simple syntax and developing capabilities. However, little research has been published about how secure Python code and programs compiled from Python code actually are. This research seeks to expose vulnerabilities in Python code and determine what must be done for these vulnerabilities to be exploited by hackers to abuse potentially sensitive information contained within the program.
The proposed methodology includes examining the private variable concept in other programming languages and conducting …
Computational Investigations Into Astrochemical Inorganic Oxides, Ammonia Borane, And Genetic Algorithms, E. Michael Valencia
Computational Investigations Into Astrochemical Inorganic Oxides, Ammonia Borane, And Genetic Algorithms, E. Michael Valencia
Honors Theses
The formulations of quantum mechanics in the early 1900s were exciting theoretical discoveries, but were not practical to apply until the advent of computers and the subsequent computational methods in 1951. With the introduction of tractable simplifications, procedures such as Hartree-Fock allowed for determination of properties of non-trivial systems. Presently, huge leads of computational power have allowed for extremely precise, quantitative work that can be applied to the human body, synthesis, or even astrochemical processes. This thesis presents works concerning 1) the history of quantum mechanics; 2) a brief primer on computational chemistry and its methods; 3) inorganic oxides in …
Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker
Increasing Perceived Realism Of Objects In A Mixed Reality Environment Using 'Diminished Virtual Reality', Logan Scott Parker
Honors Theses
With the recent explosion of popularity of virtual and mixed reality, an important question has arisen: “Is there a way to create a better blend of real and virtual worlds in a mixed reality experience?” This research attempts to determine whether a visual filter can be created and applied to virtual objects to better convince the brain into interpreting a composite of virtual and real views as one seamless view. The method devised in this thesis is being called 'Diminished Virtual Reality'. The results found in this study show that when presented with a scene composed of a combination of …
Sandworms And Computer Worms: An Assessment Of American Critical Infrastructure Cyber Vulnerabilities And The Russian Federation's Growing Offensive Capabilities, Spencer Johns
Honors Theses
Bottom Line Up Front: It is highly likely that the Russian GRU has the capability, resources, and intent to execute cyberweapon attacks against American critical infrastructure in times of heightened tensions, either as a warning or a first strike. I also assess that much of current American critical infrastructure is not secure enough to withstand a coordinated assault by the GRU, and very likely has numerous severe vulnerabilities known by the GRU.
Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines
Generative Adversarial Networks Take On Hand Drawn Sketches: An Application To Louisiana Culture And Mardi Gras Fashion, Stephanie Hines
Honors Theses
No abstract provided.
90snet:, Seth Richard
Nft Sneaker Marketplace Design, Testing, And Challenges, Chris Zhu
Nft Sneaker Marketplace Design, Testing, And Challenges, Chris Zhu
Honors Theses
This paper introduces the preliminary background and implementation of the NFT sneaker marketplace. Specifically, we build sneaker NFTs on top of ERC-20 within the Ethereum network and use a top-to-bottom design mechanism. Our website performs well in its functionality, compatibility, and performance. We discuss possible future steps for security implementation. In particular, we recommend using a cold wallet for clients' transactions and implementing multi-signature contracts to avoid spoofing and repudiation. Introducing the sneaker NFT marketplace will vastly reduce the costs of transactions and delivery time in the physical sneaker marketplace. We hope investors in the physical asset space can find …
Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa
Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa
Honors Theses
In this paper, we analyze the decoding of cyclic codes. First, we introduce linear and cyclic codes, standard decoding processes, and some standard theorems in coding theory. Then, we will introduce Gr¨obner Bases, and describe their connection to the decoding of cyclic codes. Finally, we go in-depth into how we decode cyclic codes using the key equation, and how a breakthrough by A. Brinton Cooper on decoding BCH codes using Gr¨obner Bases gave rise to the search for a polynomial-time algorithm that could someday decode any cyclic code. We discuss the different approaches taken toward developing such an algorithm and …
Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu
Challenges Of Constructing Entrainment Map For Arbitrary Circadian Models, Yuxuan (Nelson) Wu
Honors Theses
The entrainment map, developed by Dr.Diekman and Dr.Bose, is claimed to be a 1-dimensional map that produces a better prediction for phase-locking than methods than the phase response curve for circadian models. In his paper, he constructs the entrainment map for the two-dimensional circadian model, the Novak-Tyson model, and the other two higher-dimensional circadian models. For this thesis, we concentrate on exploring if it is viable to construct the entrainment map for other circadian models that are not included in his paper: the Becker-Weimann model and the Relogio model. In addition, we discuss the challenges of constructing the entrainment map …
Surface Reconstruction Library, Jhye Tim Chi
Surface Reconstruction Library, Jhye Tim Chi
Honors Theses
The project aims to convert an arbitrary point cloud into a triangular mesh. Point clouds are a list of 3d points that model the topology of an object. Point clouds can have various issues, such as missing or noisy data. For the scope, we had no control over point cloud generation. We were also unable to deal with underlying registration or alignment problems. Triangular meshes are a list of triangles that have 3d vertices. This aggregate list of triangles defines the reconstructed surface. Our project implementation is based on Alexander Hornung and Leif Kobbelt’s method for surface reconstruction using the …
Class Scheduling Web App, Anubhav Rawal
Class Scheduling Web App, Anubhav Rawal
Honors Theses
This Scheduling Web Application in Django was built to allow a user to create a schedule for upcoming semesters. Users with appropriate privileges could upload an excel schedule to which instructors could be assigned. Additionally features included dynamic editing for admin users and viewing the main schedule for general users. Our goal was to create an application from the ground up using the Django framework to accomplish these tasks.
Ferris Bakes, Ferris Dehart
Iot Garden Frost Alarm, Andrew James
Iot Garden Frost Alarm, Andrew James
Honors Theses
Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.
The system as designed …
The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist
The Future Of Artificial Intelligence In The Healthcare Industry, Erika Bonnist
Honors Theses
Technology has played an immense role in the evolution of healthcare delivery for the United States and on an international scale. Today, perhaps no innovation offers more potential than artificial intelligence. Utilizing machine intelligence as opposed to human intelligence for the purposes of planning, offering solutions, and providing insights, AI has the ability to alter traditional dynamics between doctors, patients, and administrators; this reality is now producing both elation at artificial intelligence's medical promise and uncertainty regarding its capacity in current systems. Nevertheless, current trends reveal that interest in AI among healthcare stakeholders is continuously increasing, and with the current …
Effects Of Bounding Tree Complexity On Immersion In A Virtual Environment, Jonathan Caputo
Effects Of Bounding Tree Complexity On Immersion In A Virtual Environment, Jonathan Caputo
Honors Theses
Bounding boxes are volumetric spaces in a 3D environment defined by a set of points that denote the area of collision for a given object. Bounding trees are known as a collection of bounding boxes. Simple bounding trees contain few bounding boxes and complex bounding trees contain many. Our research aims to find the relationship between the complexity of a bounding tree and a user's immersion in a 3D virtual environment. We created an algorithm that used the bounding trees to check for when an object collides with another. Using this algorithm, we ran a user study where users would …